When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained inĀ https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
References
Link | Resource |
---|---|
https://github.com/grpc/grpc/pull/32309 | Patch |
https://github.com/grpc/grpc/pull/33005 | Patch |
Configurations
History
No history.
Information
Published : 2023-06-09 11:15
Updated : 2023-06-15 22:18
NVD link : CVE-2023-32731
Mitre link : CVE-2023-32731
CVE.ORG link : CVE-2023-32731
JSON object : View
Products Affected
grpc
- grpc
CWE